Sciweavers

791 search results - page 50 / 159
» Users and Trust in Cyberspace
Sort
View
ICWSM
2009
13 years 5 months ago
A Comparative Analysis of Trust-Enhanced Recommenders for Controversial Items
A particularly challenging task for recommender systems (RSs) is deciding whether to recommend an item that received a variety of high and low scores from its users. RSs that inco...
Patricia Victor, Chris Cornelis, Martine De Cock, ...
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
OTM
2005
Springer
14 years 1 months ago
QoS-Based Service Selection and Ranking with Trust and Reputation Management
Abstract. QoS-based service selection mechanisms will play an essential role in service-oriented architectures, as e-Business applications want to use services that most accurately...
Le-Hung Vu, Manfred Hauswirth, Karl Aberer
ACSAC
2004
IEEE
13 years 11 months ago
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain fun...
Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuj...
CN
2006
81views more  CN 2006»
13 years 7 months ago
Taxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy...
Sergio Marti, Hector Garcia-Molina